Article Title,Year,Volume,Issue,Page Range,Author Shaping a Novel Security Approach in Chemical Industrial Clusters to Prevent Large-Scale Domino Events,2009,22,2,119-142,Reniers Assessing and managing risk among different victims of domestic abuse: Limits of a generic model of risk assessment,2009,22,3,190-204,Robinson A six-step model of potential victims' decisions to change location,2009,22,3,230-249,Smith A Review of the Effectiveness of Neighbourhood Watch,2009,22,2,143-155,Bennett Making safer places: Gender and the right to the city,2009,22,3,219-229,Beebeejaun Bureaucracy Imagination and U.S. Domestic Security Policy,2009,22,2,101-118,Bougen Gender crime victimization and fear of crime,2009,22,1,24-39,Piquero Toward a gendered Second Generation CPTED for preventing woman abuse in rural communities,2009,22,3,178-189,DeKeseredy Policing terror threats and false positives: Employing a signal detection model to examine changes in national and local policing strategy between 2001 and 2007,2009,24,1,19-36,Kilburn The utility of hotspot mapping for predicting spatial patterns of crime,2008,21,1-2,4-28,Chainey The "hottest" part of a hotspot: comments on "the utility of hotspot mapping for predicting spatial patterns of crime",2008,21,4,295-302,Levine A brief commentary on "the utility of hotspot mapping for predicting spatial patterns of crime",2008,21,4,291-292,Pezzuchi The Boy Next Door: Local Teen-Age Burglars in Montreal,1991,2,,200-204,Biron Who wants to allow concealed weapons on the college campus?,2014,27,3,304-319,Jang Trafficking and global crime control,2014,27,3,341-343,Kosloski A capture-recapture model to estimate the effects of extra-legal disparities on crime funnel selectivity and punishment avoidance,2016,29,4,561-583,Charette A design against crime intervention to reduce violence in the night-time economy,2012,25,2,116-133,Marselle Exploring the relationship between drug and alcohol treatment facilities and violent and property crime: A socioeconomic contingent relationship,2012,25,2,95-115,Salvatore Self-rated attention to detail predicts threat detection performance in security X-ray images,2012,25,4,356-371,Viding Reducing harm from explosive attacks against railways,2012,25,4,309-325,Meyer Competition versus monopoly in the provision of police,2013,26,2,157-179,Hakim Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror,2012,25,1,57-75,Costanza The relationship between cell phone use and sense of security: A two-nation study,2012,25,4,291-308,Tennakoon Self-rated attention to detail predicts threat detection performance in security X-ray images: Corrigendum,2012,25,4,372,Viding Growing overlap between terrorism and organized crime in India: a case study,2013,26,1,60-79,Sharma Examining the effects of stressors on organizational citizenship behaviors among private correctional staff: a preliminary study,2012,25,2,152-172,Altheimer A comparative study of hazardous material transportation security issues in Flanders and in Apulia,2013,26,2,142-156,Reniers Security in Stockholm's underground stations: the importance of environmental attributes and context,2013,26,1,33-59,Ceccato Issues in courtroom security: a key role for the private sector in Australia and New Zealand,2012,25,1,25-37,Prenzler Campus violence preparedness of US college campuses,2012,25,3,199-211,Blair The role of neighborhood parks as crime generators,2012,25,1,1-24,McCord An empirical study of a behavioral decision model with moderated effects for long-range security initiatives,2013,26,1,16-32,Workman An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West,2012,25,3,212-228,Kebbell The audacity of the Boko Haram: background analysis and emerging trend,2012,25,2,134-151,Onuoha Recent inquiries into the private security industry in Australia: implications for regulation,2012,25,4,342-355,Prenzler TePiTri: A screening method for assessing terrorist-related pipeline transport risks,2012,25,2,173-186,Dullaert Self-exciting point process models of civilian deaths in Iraq,2012,25,3,244-264,Brantingham Public attitudes to airport security: the case of whole body scanners,2012,25,3,229-243,Bowers Comparison of strategic and operational good practice for private security personnel in the night-time economy and the Cairns City model,2012,25,4,326-341,Clough Examining active shooter events through the rational choice perspective and crime script analysis,2017,30,3,880-902,Osborne Minority threat and school security: assessing the impact of Black and Hispanic student representation on school security measures,2017,30,2,504-522,Parker Why did Mexico become a violent country? Assessing the role of firearms trafficked from the U.S,2020,33,,179-209,Gill Tabletop scenario exercises as a training tool for improving response to workplace violence,2022,ePub,ePub,ePub,Peek-Asa Students plans to obtain a license to carry on campus after the passage of Texas Senate Bill 11,2021,34,2,299-318,Saber Understanding the consideration of strategies for coping with locality violence in Arab society in Israel,2023,ePub,ePub,ePub,Rosenberg